-
公开(公告)号:US20240372838A1
公开(公告)日:2024-11-07
申请号:US18291813
申请日:2021-07-30
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Christoph Graham , Thomas Flynn
IPC: H04L9/40
Abstract: A host proxy executable within a virtualized environment hostable by a host computing device for a client device intercepts an embedded security hardware communication request sent by an application executable within the virtualized environment. The host proxy sends the embedded security hardware communication request to a client proxy executable on the client computing device. The client proxy relays the embedded security hardware communication request to embedded security hardware of the client computing device.
-
公开(公告)号:US20220129589A1
公开(公告)日:2022-04-28
申请号:US17419067
申请日:2019-07-10
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Srivatsan Mani , Thomas Flynn , Trey Elliott
Abstract: Example wood panel assemblies that are disposed on electronic devices are disclosed. In an example, an electronic device includes a palm rest, and a trackpad disposed on the palm rest. In addition, the electronic device includes a wood panel assembly mounted on top of the palm rest and the trackpad. The wood panel assembly includes a wood veneer panel including a top surface and a bottom surface. The bottom surface covers the palm rest and the trackpad. In addition, the wood panel assembly includes a fabric material secured along the bottom surface.
-
公开(公告)号:US20220078026A1
公开(公告)日:2022-03-10
申请号:US17419248
申请日:2019-04-30
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Thomas Flynn , Srivatsan Mani , Trey Elliott
Abstract: A network interface connector may receive a workload via a network. A security chip may verify a signature of the workload based on a public-private key pair, the private key corresponding to the security chip. A processor may execute the workload in response to the verification of the signature.
-
公开(公告)号:US12026286B2
公开(公告)日:2024-07-02
申请号:US17419067
申请日:2019-07-10
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Srivatsan Mani , Thomas Flynn , Trey Elliott
CPC classification number: G06F21/64 , G06F9/45558 , G06F21/44 , G06F2009/45575 , G06F2009/45579 , G06F2009/45587 , G06F2009/45595
Abstract: In some examples, non-transitory computer-readable storage stores machine-readable instructions that, when executed by a processor, cause the processor to identify an idle state of a computing device; evaluate a root of trust between a security chip and a container system to verify that the container system is a trusted container system; enable the trusted container system; receive a container during the idle state; and execute the container during the idle state using the trusted container system.
-
公开(公告)号:US20220413936A1
公开(公告)日:2022-12-29
申请号:US17774186
申请日:2019-11-19
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Trey Elliott , Thomas Flynn , Srivatsan Mani
Abstract: An example system may include a processor and a non-transitory machine-readable storage medium storing instructions executable by the processor to validate a software container, stored on a hardware controller embedded in a computing device, utilizing an encryption mechanism specific to the computing device; insert an instance of the software container, responsive to a successful validation of the software container, from the hardware controller into an operating system of the computing device.
-
公开(公告)号:US20210342483A1
公开(公告)日:2021-11-04
申请号:US17285504
申请日:2018-12-11
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Thomas Flynn , Harold Merkel , Rahul V. Lakdawala , Charles J. Stancil
IPC: G06F21/62
Abstract: An example of a computer-readable medium storing machine-readable instructions. When executed, the instructions may cause detection of an access to a resource with a privacy setting. The instructions may cause the modification of the privacy setting to a new value.
-
公开(公告)号:US09536116B2
公开(公告)日:2017-01-03
申请号:US14653450
申请日:2012-12-21
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Kent E Biggs , Michael Provencher , Thomas Flynn
Abstract: Examples disclose a cable to secure data transmission. Examples of the cable include a connector to connect to a computing device for data transmission. Further, the examples of the cable include an active component coupled to the connector and embedded in the cable. The active component is to at least perform one of encrypt and decrypt the data transmitted on the cable.
Abstract translation: 示例公开了用于保护数据传输的电缆。 电缆的示例包括连接到用于数据传输的计算设备的连接器。 此外,电缆的示例包括耦合到连接器并嵌入电缆中的有源部件。 活动组件至少要对电缆上传输的数据进行加密和解密。
-
公开(公告)号:US20150310232A1
公开(公告)日:2015-10-29
申请号:US14653450
申请日:2012-12-21
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Kent E. Biggs , Michael Provencher , Thomas Flynn
Abstract: Examples disclose a cable to secure data transmission. Examples of the cable include a connector to connect to a computing device for data transmission. Further, the examples of the cable include an active component coupled to the connector and embedded in the cable. The active component is to at least perform one of encrypt and decrypt the data transmitted on the cable.
Abstract translation: 示例公开了用于保护数据传输的电缆。 电缆的示例包括连接到用于数据传输的计算设备的连接器。 此外,电缆的示例包括耦合到连接器并嵌入电缆中的有源部件。 活动组件至少要对电缆上传输的数据进行加密和解密。
-
-
-
-
-
-
-